Skip to content
Home
About Us
Contact Us
Register to apply for a free CISO2CISO Membership
CISO2CISO Network
CISO2CISO Services
Sitemap
Submit News
Twitter
Linkedin-in
Youtube
Rss
CISO2CISO Notepad Series
SOC -CSIRT – Incidents & Attacks Notepad
Vendors & – MSSP Ecosystem
Cybersecurity Latest News
User Private Area
Login
Register – Create Account Member
Account
Home
CISO Strategics
Page 3
CISO Strategics
KROLL
Cyber Risk and CFOs – Over-Confidence is Costly – 2022 Edition by KROLL
Microsoft Security
Threat Hunting Survival Guide by Microsoft Security Experts
Tommy Babel
Executive Guide to Cyber Crisis Management 2023
CYFIRMA
ADVANCED SOCIAL ENGINEERING ATTACKS DECONSTRUCTED BY CFYRMA
MSSP ALERT
TOP 250 MSSPs Services Providers 2022 edition by MSSP Alert – A CyberRisk Alliance Resource...
McKinsey
Cybersecurity in a Digital Era by McKinsey. Digital McKinsey and Global Risk Practice.
Microsoft Security
Building a Holistic Insider Risk Management Program – 5 elements that help companies have stronger...
Cencys
2022 State of the internet report by cencys
ENISA-EUROPA
A Governance Framework for National Cybersecurity Strategies by European Union Agency for Cybersecurity – enisa
Harvard Business Review
Boards Are Having the Wrong Conversations About Cybersecurity – Board interactions with the CISO are...
BCG Global Cybersecurity Forum
Turning a Cybersecurity Strategy Into Reality A Holistic Performance Management Framework by BCG & STC
Arizona State University
THE FUTURE OF CYBER ENABLED FINANCIAL CRIME – New Crimes, New Criminals, and Economic Warfare...
Microsoft Security
Data Loss Prevention from on-premises to cloud by Microsoft Security
MANDIANT
THE DEFENDER´S ADVANTAGE – A GUIDE TO ACTIVATING CYBER DEFENSE BY MANDIANT
ICS2
A Resilient Cybersecurity Professionn Chart the Path Forward – ICS2 CYBERSECURITY WORKFORCE STUDY – A...
Argentina
Propuesta de Anteproyecto de Ley de Proteccion de Datos Personales – Ley 25326 – Agencia...
NIST
Artificial Intelligence Risk Management Framework – AI RMF 1.0 By NIST
ISACA
Reporting Cybersecurity Risk to the Board of Directors by ISACA
HARDVARD Kennedy School
National Cyber Power Index 2022 – HARDVARD Kennedy School – BELFER CENTER for Science and...
ISMS Forum & DPI
Guia Practica para la Gestion de Breachas de Datos Personas by ISMS and DPI
7 CEO CYBERSECURITY ACTIONS – START WORKING ON IT TODAY , DON´T WAIT !!!
CISA
Cybersecurity Incident & Vulnerability Response Playbooks by CISA
SCYTHE
Better Cybersecurity Metrics – SOC Metrics – Threat Hunting Metrics – Cyber Threat Intelligence (CTI)...
Dr. Erdal Ozkaya
Hiring a CISO – Super Guide for startups by Erdal Ozkaya
Ninjio´s
Ninjio´s Cyber Hygiene Checklist – Level Up Your Cybersecurity
ENISA
Identifying Emerging Cyber Security Threats and Challenges for 2030 by ENISA nad European Union Agency...
stottandmay.com
The CISO Survival Guide – Practical advice for Security Leaders by stottandmay.com
ECIIA
2023 RISK IN FOCUS – Hot topics for internal auditors by ECIIA – VUCA context...
hackercombat
10 Cyber Security Myths You Need To Stop Believing by HACKER COMBAT COMMUNITY
DRATA.COM
A Complete Guide to Cybersecurity Risk Management – Learn the ins and outs of risk...
Posts navigation
1
2
3
4
Latest Cyber News
The Register Security
Infosec biz boss accused of BS’ing the world about his career, anti-crime product, customers –...
01/05/2024
The Register Security
US charges 16 over ‘depraved’ grandparent scams – Source: go.theregister.com
01/05/2024
The Register Security
Qantas app glitch sees boarding passes fly to other accounts – Source: go.theregister.com
01/05/2024
The Register Security
Ring dinged for $5.6M after, among other claims, rogue insider spied on ‘pretty girls’ –...
01/05/2024
The Register Security
Two cuffed in Samourai Wallet crypto dirty money sting – Source: go.theregister.com
01/05/2024
The Register Security
Russia, Iran pose most aggressive threat to 2024 elections, say infoseccers – Source: go.theregister.com
01/05/2024
The Register Security
Indian bank’s IT is so shabby it’s been banned from opening new accounts – Source: go.theregister.com
01/05/2024
The Register Security
Australia’s spies and cops want ‘accountable encryption’ – aka access to backdoors – Source: go.theregister.com
01/05/2024
The Register Security
Governments issue alerts after ‘sophisticated’ state-backed actor found exploiting flaws in Cisco security boxes – Source: go.theregister.com
01/05/2024